CVE-2026-25810

9.1 CRITICAL

📋 TL;DR

PlaciPy placement management system version 1.0.0 has an authorization vulnerability where authenticated users can access other users' student submission data due to missing ownership checks. This affects all educational institutions using the vulnerable version. The vulnerability allows unauthorized data access but requires valid authentication.

💻 Affected Systems

Products:
  • PlaciPy
Versions: 1.0.0
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the student submission functionality in the backend routes. Requires the system to be deployed and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attackers could access, modify, or delete all student submission data across the entire system, potentially exposing sensitive educational records and compromising data integrity.

🟠

Likely Case

Authenticated users (students, faculty, or administrators) could view or manipulate student submission data belonging to other users, leading to privacy violations and potential academic integrity issues.

🟢

If Mitigated

With proper authorization checks, users would only be able to access their own data or data they're explicitly authorized to view, maintaining proper data segregation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid authentication but minimal technical skill once authenticated. Attackers would need to manipulate object IDs or parameters in API requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.1 or later

Vendor Advisory: https://github.com/Praskla-Technology/assessment-placipy/security/advisories/GHSA-2gqv-gxrj-p8x3

Restart Required: Yes

Instructions:

1. Update PlaciPy to version 1.0.1 or later. 2. Restart the application server. 3. Verify the fix by testing authorization controls.

🔧 Temporary Workarounds

Implement middleware authorization checks

all

Add authorization middleware to verify user ownership before processing student submission requests

Implement authorization logic in backend/src/routes/student.submission.routes.ts to check if current user owns requested resources

🧯 If You Can't Patch

  • Implement network-level access controls to restrict access to the student submission endpoints to only authorized users
  • Add application-level authorization checks in a reverse proxy or API gateway to validate user ownership before requests reach the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Test if authenticated user A can access student submission data belonging to user B by manipulating object IDs in API requests to /api/student/submission endpoints

Check Version:

Check package.json or application metadata for PlaciPy version

Verify Fix Applied:

After patching, verify that authenticated users can only access their own student submission data and receive proper authorization errors when attempting to access others' data

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts for student submission endpoints
  • User accessing student submission IDs not associated with their account
  • Unusual patterns of data access across different user accounts

Network Indicators:

  • HTTP 200 responses for student submission requests with mismatched user IDs
  • High volume of requests to student submission endpoints from single authenticated users

SIEM Query:

source="application.logs" AND ("student.submission" OR "/api/student/submission") AND (user_id != resource_owner_id)

🔗 References

📤 Share & Export